Susan Bradley

Contributing Writer

Susan Bradley has been patching since before the Code Red/Nimda days and remembers exactly where she was when SQL slammer hit (trying to buy something on eBay and wondering why the Internet was so slow). She writes the Patch Watch column for Windows Secrets, is a moderator on the PatchManagement.org listserve and SBS2k, and was one of the authors of Windows Server 2008 Security Resource Kit. . In real life she’s the IT wrangler at her firm, Tamiyasu, Smith, Horn and Braun, where she manages a fleet of Windows servers, an Exchange Server, desktops, a few Macs, several iPads, a few Surface devices, several iPhones and tries to keep patches up to date on all of them. In addition, she provides forensic computer investigations for the litigation consulting arm of the firm. She blogs at www.sbsdiva.com and is on twitter at @sbsdiva. She lurks on Twitter and Facebook, so if you are on Facebook with her, she really did read what you posted. She has a SANS/GSEC certification in security and prefers Heavy Duty Reynolds wrap for her tinfoil hat.

How to prepare Microsoft Office and Windows for ransomware and email attacks

Securing Windows and Office in a time of COVID-19: update policies, remote options

Securing Windows and Office in a time of COVID-19: update policies, remote options

Delayed updates and a rush to support remote workers have forced IT and security teams to scramble. This information and advice will help them better deal with the crisis.

8 key security considerations for protecting remote workers

8 key security considerations for protecting remote workers

Many security and IT teams suddenly have to support and protect employees who must work remotely due to the COVID-19 crisis. Make sure you cover these areas.

How to prevent attackers from using Windows against you

How to prevent attackers from using Windows against you

Attackers use standard Microsoft components such as DLLs or PowerShell to avoid detection. These tips will make such "living off the land" attacks harder to execute.

Do you trust your admins? 5 tips to manage administrator access

Do you trust your admins? 5 tips to manage administrator access

The access rights that internal and external network admins possess carry the potential for abuse and errors that can expose systems and data. These practices can help avoid that.

How to prevent scripting attacks in Microsoft Office

How to prevent scripting attacks in Microsoft Office

The rise in phishing attempts requires another look at your Microsoft Office settings to minimize the risk of a user executing a malicious script.

How to set up your network to prevent data loss

How to set up your network to prevent data loss

Critical data is at risk from both insider and external threats. Here's how to configure your Windows network for data loss prevention (DLP).

How to fight hidden malware on Windows networks

How to fight hidden malware on Windows networks

Attackers are more clever about how they hide malicious files. Countering that starts with knowing what services belong on your network.

5 steps to avoid credential dumping attacks

5 steps to avoid credential dumping attacks

Use these five techniques on your Windows network to find and limit risk from vulnerabilities that make your organization vulnerable to credential dumping attacks.

How to set up Windows Firewall to limit network access

How to set up Windows Firewall to limit network access

By enabling Windows Firewall with the proper settings, you can help shut out attackers and limit lateral movement if a breach occurs.

The 9 Windows Server security settings you need to get right

The 9 Windows Server security settings you need to get right

With all the improvements Microsoft has made in Windows and Windows Server, it’s time to evaluate whether your security settings are as effective as they could be.

How to implement Windows 7, Server 2008 security updates after end-of-life

How to implement Windows 7, Server 2008 security updates after end-of-life

Microsoft has ended support for Windows 7 and Windows Server 2008, but you can purchase extended security updates. Here's what you need to do to implement them.

Load More